Research Article
[Retracted] Analysis of Malware Detection and Signature Generation Using a Novel Hybrid Approach
Table 1
Effectiveness evaluation to detect malware variants
| Malware | Variants in training test | Variants tested | Detected | Malware | Variants in training test | Variants tested | Detected |
| Netsky | C d | E | Yes | Chiton | A b | c | Yes | Gen | Yes | d | Yes | L | Yes | e | Yes | M | Yes | f | Yes | N | Yes | h | Yes | P | Yes | i | Yes | R | No | j | Yes | x | Yes | k | Yes | Bagle | A bb | b | Yes | l | Yes | ab | Yes | m | Yes | ad | Yes | n | Yes | ae | Yes | o | Yes | al | Yes | p | Yes | as | Yes | q | Yes | bi | Yes | r | Yes | t | Yes | chiton | Yes | My doom | A c | d | Yes | Bifrose | A ab | ae | Yes | e | Yes | ag | Yes | f | Yes | aq | Yes | g | Yes | at | Yes | h | Yes | ax | Yes | i | Yes | bb | Yes | o | Yes | bc | Yes | q | Yes | bf | Yes | r | Yes | bg | Yes | u | Yes | bh | Yes | v | Yes | bk | Yes | y | Yes | bl | Yes | aa | Yes | bo | Yes | ae | Yes | bs | Yes | af | Yes | ca | Yes | ai | Yes | cc | Yes | aj | Yes | agent | A ab | ad | Yes | ak | Yes | ae | Yes | al | Yes | ah | Yes | an | Yes | aj | Yes | aq | Yes | bc | Yes | ar | Yes | bd | Yes | as | Yes | abz | Yes | at | Yes | aci | Yes | av | Yes | acx | Yes | ay | Yes | adr | Yes | az | Yes | ads | Yes | Delf | 62976 c | d | Yes | Invictus DLL | 101.a 101.b | 099 | Yes | f | Yes | 201.b | Yes | g | Yes | 102 | Yes | h | Yes | 103.a | Yes | j | Yes | 200.b | Yes | k | Yes | 201.a | Yes | m | Yes | 200.a | Yes | n | Yes | a | Yes | r | Yes | b | Yes | v | Yes | c | Yes | w | Yes | d | Yes |
|
|